A special type gateway that can keep external users from accessing resources on the LAN users access the external info is called:

A.&nbsp

Repeater

B.&nbsp

Firewall

C.&nbsp

Encryption

D.&nbsp

Hub

E.&nbsp

None of these

2.

In SQL, which command is used to changes data in a data table?

A.&nbsp

UPDATE

B.&nbsp

INSERT

C.&nbsp

BROWSE

D.&nbsp

APPEND

E.&nbsp

None of These

3.

In SQL, which of the following is not a data definition language command?

A.&nbsp

RENAME

B.&nbsp

REVOKE

C.&nbsp

GRANT

D.&nbsp

UPDATE

E.&nbsp

None of these

4.

What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end?

A.&nbsp

Handshaking

B.&nbsp

Modem

C.&nbsp

Protocol

D.&nbsp

All of These

E.&nbsp

None of these

5.

Which command(s) is (are) used to redefine a column of the table in SQL ?

A.&nbsp

ALTER TABLE

B.&nbsp

DEFINE TABLE

C.&nbsp

MODIFY TABLE

D.&nbsp

All of these

E.&nbsp

None of these

6.

In a relational schema, each tuple is divided into fields called

A.&nbsp

Relations

B.&nbsp

Domains

C.&nbsp

Queries

D.&nbsp

All of the above

E.&nbsp

None of these

7.

An indexing operation

A.&nbsp

Sorts a file using a single key

B.&nbsp

Sorts file using two keys

C.&nbsp

Establishes an index for a file

D.&nbsp

Both (A) and (C)

E.&nbsp

None of these

8.

Data security threats include

A.&nbsp

Hardware failure

B.&nbsp

Privacy invasion

C.&nbsp

Fraudulent manipulation of data

D.&nbsp

All of these

E.&nbsp

RTL

9.

A ___ means that one record in a particular record type is related to only one record of another record type.

A.&nbsp

One to one relationship

B.&nbsp

One to many relationship

C.&nbsp

Many to one relationship

D.&nbsp

Many to many relationship

E.&nbsp

Both (A) and (C)

10.

A ___ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.

A.&nbsp

File structures

B.&nbsp

Records

C.&nbsp

Fields

D.&nbsp

Database

E.&nbsp

None of These

11.

Through linked list one can implement

A.&nbsp

Stack

B.&nbsp

Graph

C.&nbsp

Queue

D.&nbsp

All of the above

E.&nbsp

None of these

12.

A heap allows a very efficient implementation of a

A.&nbsp

Doubled ended queue

B.&nbsp

Priority queue

C.&nbsp

Stacks

D.&nbsp

Trees

E.&nbsp

None of these

13.

In files, there is a key associated with each record which is used to differentiate among different records. For every file there is at least one set of keys that is unique. Such a Key is called

A.&nbsp

Unique key

B.&nbsp

Prime attribute

C.&nbsp

Index key

D.&nbsp

Primary Key

E.&nbsp

Null key

14.

____ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes.

A.&nbsp

TCP(transfer control protocol)

B.&nbsp

DNS(Domain Name System)

C.&nbsp

SHA (Secure Hash Algorithm)

D.&nbsp

Simple Network Management Protocol (SNMP)

E.&nbsp

None of these

15.

Override is a method

A.&nbsp

For an operation that replaces an inherited method for the same operation

B.&nbsp

For a data that replaces an inherited method for the same operation

C.&nbsp

For an operation that takes arguments form library function

D.&nbsp

All of these

E.&nbsp

None of these

16.

Local variables

A.&nbsp

Are created outside a block

B.&nbsp

Are known only to that block

C.&nbsp

Continue to exist when their block ends

D.&nbsp

Are illegal in C++

E.&nbsp

None of these

17.

____ is virus that inserts itself into a system’s memory. Then it take number of actions when an infected file is executed.

An important application of cryptography, used in computerized commercial and financial transaction

A.&nbsp

Data mining

B.&nbsp

Data warehousing

C.&nbsp

Digital signature

D.&nbsp

Media convergence

E.&nbsp

Both (b) and (c)

22.

Data mining evolve as a mechanism to cater the limitations of ___ systems to deal massive data sets with high dimensionality, new data type, multiple heterogeneous data resource etc.

A.&nbsp

OLTP

B.&nbsp

OLAP

C.&nbsp

DSS

D.&nbsp

Data Warehouse

E.&nbsp

None of these

23.

Rows of a relation are called:

A.&nbsp

Relation

B.&nbsp

Tuples

C.&nbsp

Data structure

D.&nbsp

An entity

E.&nbsp

None of these

24.

Which of the following is not a connecting device?

A.&nbsp

Bridge

B.&nbsp

Trans receiver

C.&nbsp

Router

D.&nbsp

Repeater

E.&nbsp

None of these

25.

Which layer of OSI determines the interface of the system with the user?

A.&nbsp

Network

B.&nbsp

Application

C.&nbsp

Data link

D.&nbsp

Session

E.&nbsp

None of these

26.

The tracks on a disk which can be accused without repositioning the R/W heads is

A.&nbsp

Surface

B.&nbsp

Cylinder

C.&nbsp

Cluster

D.&nbsp

All of these

E.&nbsp

None of these

27.

A computer system consisting of its processor, memory and I/O devices accepts data, processes it and produces the output results .Can you tell in which component is the raw data fed?

A.&nbsp

Mass Memory

B.&nbsp

Main Memory

C.&nbsp

Logic Unit

D.&nbsp

Arithmetic unit

E.&nbsp

None of these

28.

The mechanical diskette drive in which you insert your diskette is connected to the computer’s—bus

A.&nbsp

Data

B.&nbsp

Communication

C.&nbsp

Address

D.&nbsp

Parallel

E.&nbsp

None of these

29.

A set of programs that handle firm’s database responsibilities is called a

A.&nbsp

Data base Management System (DBMS)

B.&nbsp

Data Base Processing System (DBPS)

C.&nbsp

Data Management System (DMS)

D.&nbsp

All of these

E.&nbsp

None of these

30.

You are in the process of analyzing a problem that requires you to collect and store TCP/ IP Packets. Which of the following utilities is best suited for this purpose

A.&nbsp

NBTSTAT

B.&nbsp

Performance Monitor

C.&nbsp

NETSTAT

D.&nbsp

Network Monitor

E.&nbsp

DHCP Management Console

31.

Which of the following is true about GUIs?

A.&nbsp

They make computers easier to use for nonprofessionals

B.&nbsp

They use icons and menus that users can select with a mouse

C.&nbsp

Both (1) and (2)

D.&nbsp

None of these

32.

The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk is known as

A.&nbsp

Multiprogramming

B.&nbsp

Spooling

C.&nbsp

Caching

D.&nbsp

Virtual programming

E.&nbsp

None of these

33.

Decision support system are based on ____ analysis

A.&nbsp

Query and reporting

B.&nbsp

Data mining

C.&nbsp

OLAP

D.&nbsp

All of these

E.&nbsp

None of these

34.

From what location are the 1st computer instructions available on boot up ?

A.&nbsp

ROM BIOS

B.&nbsp

CPU

C.&nbsp

Boot.ini

D.&nbsp

CONFIG.SYS

E.&nbsp

None of these

35.

In ER diagrams, the term cardinality is a synonym for the term—

A.&nbsp

Attribute

B.&nbsp

Degree

C.&nbsp

Entities

D.&nbsp

Cartesian

E.&nbsp

All of these

36.

Aggregation is a special form of

A.&nbsp

Generalization

B.&nbsp

Specialization

C.&nbsp

Association

D.&nbsp

Object

E.&nbsp

None of these

37.

An oracle server index—

A.&nbsp

Is a schema object

B.&nbsp

Is used to speed up the retrieval of rows by using a pointer

C.&nbsp

Is independent of the table it indexes

D.&nbsp

All of these

E.&nbsp

None of these

38.

Relocation bits used by relocating loader are specifically (generated) by:

A.&nbsp

Relocating loader itself

B.&nbsp

Linker

C.&nbsp

Assembler or translator

D.&nbsp

Macro processor

E.&nbsp

None of these

39.

Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly?

A.&nbsp

Two pass assembler

B.&nbsp

Load and go assembler

C.&nbsp

Macro processor

D.&nbsp

Compiler

E.&nbsp

None of these

40.

Abstraction is

A.&nbsp

The act of representing the essential features of something without including much detail.

B.&nbsp

The act of representing the features of something much detail

C.&nbsp

A tree structure

D.&nbsp

All of these

E.&nbsp

None of these

41.

Which of the following is a phase of RAD model?

A.&nbsp

Business modeling

B.&nbsp

Data modeling

C.&nbsp

Application generation

D.&nbsp

All of the above

E.&nbsp

None of these

42.

Which of the following is not a context free grammar components?

A.&nbsp

Terminal symbols

B.&nbsp

Nonterminal symbol

C.&nbsp

Production line

D.&nbsp

List

E.&nbsp

None of these

43.

Consider an operation of addition. For two numbers, the operating will generate a sum. If the operand are strings, and the same operation would produce a third string by concatenation. This features is called ____.

A.&nbsp

Inheritance

B.&nbsp

Encapsulation

C.&nbsp

Polymorphism

D.&nbsp

Binding

E.&nbsp

All of these

44.

A combinational logic circuit which is used to send data coming from a single source to two or more separate destinations is called as

A.&nbsp

Decoder

B.&nbsp

Encoder

C.&nbsp

Multiplexer

D.&nbsp

Demultiplexer

E.&nbsp

None of these

45.

Which of the following is a universal gate?

A.&nbsp

AND

B.&nbsp

OR

C.&nbsp

EXOR

D.&nbsp

NAND

E.&nbsp

None of these

46.

The two’s compliment of binary number 010111.1100 is

A.&nbsp

101001.1100

B.&nbsp

101000.0100

C.&nbsp

010111.0011

D.&nbsp

101000.0011

E.&nbsp

None of these

47.

In 8086 the overflow flag is set when

A.&nbsp

The sum is more than 16 bits

B.&nbsp

Signed numbers go out their range after an arithmetic operation

C.&nbsp

Carry and sign flags are set

D.&nbsp

During subtraction

E.&nbsp

None of above

48.

What does microprocessor speed depends on?

A.&nbsp

Clock

B.&nbsp

Data bus width

C.&nbsp

Address bus width

D.&nbsp

All of these

E.&nbsp

None of these

49.

The TRAP is one of the interrupts available its INTEL 8085. Which one statement is true of TRAP?

A.&nbsp

It is level triggered

B.&nbsp

It is negative edge triggered It is positive edge triggered

C.&nbsp

It is positive edge triggered

D.&nbsp

It is both positive edge triggered and level triggered

E.&nbsp

None of these

50.

____ is a set design steps that allows a DFD with transform flow characteristics to be mapped into a predefined template for program structure.